This is default featured slide 1 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 2 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 3 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 4 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 5 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

Monday, August 1, 2011

Firesheep Makes Facebook Hacking Easy

Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, with Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account
What is Session Hijacking?

In a Http session hijacking attack an attacker steals victims cookies, Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account

How can a Hacker use Firesheep to Hack a Facebook or any other account?

Now I will tell you how can a hacker use firesheep to hack a facebook or any other account, You will need the following things:
Method
1. First of all download "Firesheep" from the above link and use the "openwith" option in the firefox browser

2. Once you have installed firesheep on firefox web browser, Click on view at the top, then goto sidebar and click on Firesheep


3. Now click on the top left button "Start capturing" and it will start to capture the session cookies of people in your wifi network, This will show you the list of those people whose cookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly
Firesheep


Getting started with 2-step verification

How it works


Why you should use 2-step verification
2-step verification adds an extra layer of security to your Google Account by requiring you to have access to your phone – as well as your username and password – when you sign in. This means that if someone steals or guesses your password, the potential hijacker still can't sign in to your account because they don't have your phone.


How you sign in with 2-step verification
1. When you want to access Google products from your browser, go to that product and enter your username and password.
image of brain with arrow to sign in


2. You'll next be prompted to enter your verification code, which you'll get from your phone. You'll only have to do this once every 30 days if you so choose.
image of phone to verification screen

3. Soon after you turn on 2-step verification, non-browser applications and devices that use your Google Account (such as Gmail on your phone or Outlook), will stop working. You'll then have to sign in using your username and a special password you generate for this application. (Don't worry, you'll only have to do this once for each device or application.)
image of application-specific password to phone


What you’ll need
While 2-step verification requires some web savvy, you only need a few basic items:
  1. A phone that is usually available to you when you sign in. This could be:
    • A standard phone (landline or mobile)
    • Any Android device, BlackBerry device, iPhone, iPod Touch, or iPad that can run the Google Authenticator application
  2. A backup phone that you can use if you lose access to your primary phone. This could be:
    • A work or home phone (landline or mobile)
    • The phone of someone you trust, like a friend or family member.
How to get started
Go to your Accounts settings page and look for the Using 2-step verification link. If you have the link, click it and start the setup process.
If you do not see the link and you are a Google Apps user, you might have to access the 2-step verification setup through a special URL. It is also possible that your domain administrator has not yet set it up for your organization. Check with your domain administrator to find out.


ManageAccount settings page





[This post is originally posted @ google]

Friday, July 29, 2011

A new look for Google Translate for Android

When Google launched the first version of Google Translate for Android in January 2010, we were excited about the year ahead. For the first time, they were bringing the capabilities supported on Google Translate—like machine translation, romanization of non-Roman scripts and spoken translations—to the Android platform. It also offered voice input to let you speak the word or phrase you wanted to translate instead of typing it in, and SMS translation so you could translate SMS messages sent to you in foreign languages.

With new refreshing Translate for Android with several updates to make the app easier to interact with. Among other improvements, they have created better dropdown boxes to help select the languages you want to translate from and into, an improved input box, and cleaner icons and layout.



It also let you in on an experimental feature that’s still in its earliest stages—Conversation Mode. This is a new interface within Google Translate that’s optimized to allow you to communicate fluidly with a nearby person in another language.

In conversation mode, simply press the microphone for your language and start speaking. Google Translate will translate your speech and read the translation out loud. Your conversation partner can then respond in their language, and you’ll hear the translation spoken back to you. Because this technology is still in alpha, factors like regional accents, background noise or rapid speech may make it difficult to understand what you’re saying. Even with these caveats, we’re excited about the future promise of this technology to be able to help people connect across languages.


As Android devices have spread across the globe, we’ve seen Translate for Android used all over. The majority of its usage now comes from outside the United States, and now seen daily usage from more than 150 countries, from India to Mexico to Mozambique. It’s really rewarding for us to see how this new platform is helping us break down language barriers the world over.
Translate supports 53 languages, from Afrikaans to Yiddish, and voice input for 15 languages. You can download the application, available for devices running Android 2.1 and above, by searching for “Google Translate” in Android Market or by scanning the QR Code below.

Tuesday, July 26, 2011

Customize your FaceBook CHAT :-)

It’s been a month now and I haven’t seen a single person who likes the new Facebook chat. People around the world creating groups against this new chat system and complaining to Facebook. The new Facebook chat sidebar only shows the list of people you chat with the most but I don’t think it works correctly as I can see people in my chat list whom I’ve never chatted with on Facebook.

Also, one thing I didn’t get at all is if the person is offline  then why do they need to still be shown on chat? The biggest flaw is that it doesn’t show you who’s online. You need to search A,B,C, just to find online friends. In this post, I’m sharing a trick to find who is online.

So finally, I created my own kinda cheat to get my old nice facebook chat. Here it is for you guys only @ psychocoding
.fbChatSidebar {
overflow: auto !important;
top: inherit !important;
bottom: 0 !important;
height:auto; /*you can change according to your suitability */
border-top: 20px solid #627AAD !important;
}
#globalContainer { left: 0 !important; }

.fbChatSidebar .item { display: none; }

.fbChatSidebar .active { display: block !important; }

Steps to implement this on Chrome (since i prefer chrome :-P)
1. Visit https://chrome.google.com/webstore/detail/pabfempgigicdjjlccdgnbmeggkbjdhd?hl=en and  Download.
2. Click Extension in Chrome Settings and select OPTION under Chrome Stylist
or
Open www.facebook.com and you can see a rainbow icon in your address bar.
3. Right click on it and select option.
4. In Basic -> Select Always
5. In Style -> Paste the above css stylesheet, and click apply changes.

And here you go, with new improved fb chat, just for you :-)


OR 

You can simply drag this userscript into Chrome and it will automatically detect and install it, and your old facebook chat will be back :-)

Saturday, July 23, 2011

Fact - That you should know : Relation b/w Alcohol and Programming Skill

Ballmer Peak

What you say???   Lets Party ;-)

Monday, July 18, 2011

How to Fix Google Chrome Crash Problem

Few Days Back I used to love Google Chrome but Suddenly after recent updates of Google Chrome, I noticed that every time I start Google Chrome it crashes many times.. Then I searched a lot for fixing this problem.. And I founded this solution
Their are some third party softwares with which Google Chrome in not that friendly which causes it to crash several times. If you have any of the following softwares installed on your PC, please try to update, reinstall, disable or uninstall them.I was using Internet Download manager and ESET NOD 32 Antivirus 2.7 version and the moment i updated both of them, now my google chrome works great.
  • Safe Eyes Parental Control Software
  • ContentWatch
  • Microsoft Office XP Input Method Editor
  • Naomi Web Filter
  • Trusteer Rapport
  • Hide My IP
  • Venturi Firewall
  • PPLive
  • Internet Download Manager
  • ESET NOD32 Antivirus only 2.7 version
  • iS3 anti-spyware (STOPzilla)
  • NVIDIA Network Access Manager and NVIDIA nTune
  • WinMount
  • FolderSize

What is the solution to fix it?

To see which of the programs or softwares installed in your computer/laptop are conflicting with Google Chrome and causing Google Chrome to crash, simply type “about:conflicts” in the address bar of your Google chrome.There you will be able to see list of all softwares which are integrated with Google chrome and also those who are conflicting with Google chrome.
or
See that recently released, most reliable and stable version of Google Chrome is “10.0.648.127″;
so check that whether your Chrome is updated or not?

Friday, July 15, 2011

Dual monitor setup: Two monitors are better than one


You can never have enough screen space. Instead of buying a larger computer monitor, you can buy an inexpensive second monitor or make use of a spare one and connect it to your computer (if you're using Windows 7, Windows Vista, or Windows XP)—instantly doubling your desktop space.

Dual monitor setup checklist

There’s a good chance you already have everything you need to set up your second monitor.


Know your equipment

The following table provides more information about the components for setting up an extra monitor.



How to set up your second monitor

Connect the monitor cables

When you’re ready to connect the monitor cable to the connector on your computer, make sure the monitor is plugged in and turned on. Your computer should automatically detect the second monitor, although you may have to restart your computer first. If you’re using Windows XP, you’ll need to enable Dualview.
Dual monitor setup map
When your computer detects the monitor, it should also automatically detect and apply the display settings appropriate for the monitor.

Configure your displays

You may want to adjust display settings yourself, as described in the following articles.
The settings shown here are for Windows 7, but they are basically the same as those available for Windows Vista and Windows XP. If necessary, you can drag the monitor icons so that they are arranged in the same way as the monitors on your desk. ClickIdentify to verify which monitor is 1 and which monitor is 2. You’ll see the numbers appear on your monitors.
Control Panel Screen Resolution window
Under Multiple displays, you can also adjust what you see on the second monitor. You have the following choices:
  • Extend your displays. This spreads your desktop over both monitors and lets you drag items between the two screens. This is how most people use two monitors, and it's the default setting for desktop computers. After your monitor is set up, you can use your mouse to grab the title bar (the top portion) of a window and drag it to your new display. If a window does not move when you drag it, double-click the title bar first, and then drag it.
    Extended displays on dual monitors in Windows 7
  • Duplicate your displays. This displays the same desktop on both monitors. For a laptop, this is the default setting. This is useful if you're giving a presentation with your laptop connected to a projector or large monitor.
    Duplicated displays on dual monitors in Windows 7
  • Show your desktop on only one monitor. This is most commonly used with a laptop if you want to keep your laptop screen blank after you connect to a large desktop monitor.
    Dual monitor setup in Windows 7 with laptop screen blank
When you disconnect the additional monitor, the original display settings are restored to your primary display. In addition, all open files and program windows are moved to the primary display. The next time that you connect the same monitor, the Windows operating system automatically applies the display settings that you used the last time that you connected this monitor.
Troubleshooting: Normally, the process of setting up and using a second monitor is seamless and automatic. However, because it involves hardware and software from multiple sources, you may need to troubleshoot problems and make adjustments. For example, if your computer fails to detect the second monitor, first make sure it’s plugged in and turned on, and then, in the display settings, click Detect. Or your computer might not support multiple displays. Visit Microsoft Update, click Custom, and install any available hardware updates. You may also need to visit your computer manufacturer's website to install an updated display driver. Or you may need to install an additional display adapter. Read this troubleshooting article for Windows Vista which also includes tips that pertain to other versions of Windows.
You’ll find that having two monitors can forever change the way you work with your computer. Be creative and experiment with the sizing of application windows and what information you can keep in constant view while doing multiple tasks. If you’re looking for more ideas on what to do with all of the extra viewing space you will have, read the article, Work and play better with multiple monitors.
[This post is originally posted (a) http://www.microsoft.com ]

Wednesday, July 6, 2011

Credit Card Hackers Are Here - Have You Checked Your Credit Report Lately?

Credit card hacking has become one of the most security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent. 

That means that for every one hundred transactions you may do in the internet, you may suffer two or three breaches in your private information. Stopping credit card number hacking is, nowadays, one of the priorities of credit card brands around the world. Online companies with secure merchant accounts are less likely to get hacked therefore you can feel confident to shop online at such stores.

One funny thing about many of these hackers; free credit card numbers are posted at the internet. Some of them don't want the potential money that can be acquired from this information, only the fame.

How Are Credit Cards Gained By Hackers?

A hacker has many ways to gain a credit card number from an innocent user. The most common one is known as phishing. In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled.

If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.

Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let's say, Costco, and search for the database where the retailer stores the information of all of the users who have made recent transactions.

The third way is through the online process of buying. Let's say an adult finds a website with adult content that he or she finds attractive. It's quite probable that the website is only a masquerade for acquiring credit card information from you.

What Is A Carder?

A carder is a criminal who specializes in stealing information from credit cards. Although the majority of them buy the information from online vendors, some of them are quite savvy on how to access that information by themselves.

In the physical world, a carder will steal the information from a user while doing a face to face transaction. The criminal only needs to pass the card through a special scanner. This device will read from the magnetic strip all of the credit card information. Afterwards, the carder will trespass that information to a blank card available in many identity card stores. 

In the virtual world, credit card hacking is a bit more sophisticated and automatized. A hacker could install inside your system a credit card hacking software known as Bugbear. This program is a keystroke logger; it captures the keys that you have pressed in your keyboard and after some time, it transmits this information to the hacker. The criminal will navigate through this data, searching for any private information that can give him access to your credit card.

Besides Bugbear, there is also the IRC bot. This automated software is used for determined functions, like a moderator for a chat room. But if it is used by a hacker, he may use it for stealing your credit card information. The IRC bot will pose as an official from a company, asking you to insert your credit card information. 

Another mean that hackers use for stealing money from your credit card is through unused ebay accounts. Once they find a possible victim, the hacker uses a program that starts bombarding the account until it breaks it. Once inside, the hacker will use it for posing as the real user, selling equipment that will never reach the buyer once he buys it. 

Saturday, July 2, 2011

Facebook Engineers Build Google+ Inspired Facebook Hack

With many asserting that Google+ is heavily Facebook influenced, Facebook engineers Vladimir KolesnikovPeng FanZahan MalkaniBrian Rosenthal have flipped the switch and taken inspiration from the novel Google Circles design with Circlehack, a much simpler tool to build Facebook Friend lists.
Right now the only way you can create lists on Facebook is by going to the Friends page, clicking on the Account drop down menu, then clicking on “Edit Friends” and then again on “Create a List” and a bunch of other cumbersome stuff.
It’s a mess, but crucial if you want to achieve the same granular sharing features as Google+ on Facebook (which you can do by going to “Privacy Settings,” clicking “Customize,” then under “Make this open to” click oh hell just Google it).
While Circlehack doesn’t have all the design features of Google+ e.g. the circles your friends are members of don’t glow upon hover and you can’t automatically set Groups or privacy settings within the app, it’s a start, at least for Facebook.
Well played guys, well played.

[Note : This article is originally posted at TechCrunch]

Sunday, June 26, 2011

Microsoft way of saying "Fuck you Linux and Mac".

In October 2010, Skype debuted new Windows software with deep Facebook integration, adding the ability to use the client to monitor your Facebook news feed and post, like or comment on status updates straight from your desktop.
Recently, the company (which has been acquired by Microsoft in the meantime)released Skype for Windows 5.5 Beta, which now also lets you have instant messaging conversations with Facebook friends directly from the desktop client.
Aside from support for Facebook Chat, the client also comes with a dedicated contacts tab that filters your Skype contact list down to just your Facebook friends.
Other enhancements include a new ‘Call Control’ toolbar, improvements to the saving of a phone number in the “Call Phones” section and a number of UI changes.
Skype says the final version of the client will be released ‘soon’.
Skype image
Website:skype.com
Location:Luxembourg City, Luxembourg
Founded:August 1, 2003
Acquired:May 10, 2011 by Microsoft for $8.5B in Cash
Skype is a peer-to-peer Internet telephony service that is free for Skype-to-Skype calls. The service also allows Skype users to call mobiles and landlines, and vice-versa. Skype has special charge plans for non-Skype-to-Skype calls. 

Facebook image
Website:facebook.com
Location:Palo Alto, California, United States
Founded:February 1, 2004
Funding:$2.34B
Facebook is the world’s largest social network, with over 500 million users.

Wednesday, June 22, 2011

3 reasons why you should let Google host jQuery for you

All too often, I find code similar to this when inspecting the source for public websites that use jQuery:
<script type="text/javascript" src="/js/jQuery.min.js"></script>
If you’re doing this on a public facing website, you are doing it wrong.
Instead, I urge you to use the Google AJAX Libraries content delivery network to serve jQuery to your users directly from Google’s network of datacenters. Doing so has several advantages over hosting jQuery on your server(s): decreased latency,increased parallelism, and better caching.
In this post, I will expand upon those three benefits of Google’s CDN and show you a couple examples of how you can make use of the service.
Update: Since you’re reading this post, you may also be interested to know that Google also hosts full jQuery UI themes on the AJAX APIs CDN.
If you’ve already read all this and are just here for the link, here it is:

Decreased Latency
A CDN — short for Content Delivery Network — distributes your static content across servers in various, diverse physical locations. When a user’s browser resolves the URL for these files, their download will automatically target the closest available server in the network.
In the case of Google’s AJAX Libraries CDN, what this means is that any users not physically near your server will be able to download jQuery faster than if you force them to download it from your arbitrarily located server.
There are a handful of CDN services comparable to Google’s, but it’s hard to beat the price of free! This benefit alone could decide the issue, but there’s even more.

Increased parallelism

To avoid needlessly overloading servers, browsers limit the number of connections that can be made simultaneously. Depending on which browser, this limit may be as low as two connections per hostname.
Using the Google AJAX Libraries CDN eliminates one request to your site, allowing more of your local content to downloaded in parallel. It doesn’t make a gigantic difference for users with a six concurrent connection browser, but for those still running a browser that only allows two, the difference is noticeable.

Better caching

Potentially the greatest benefit of using the Google AJAX Libraries CDN is that your users may not need to download jQuery at all.
No matter how well optimized your site is, if you’re hosting jQuery locally then your users must download it at least once. Each of your users probably already has dozens of identical copies of jQuery in their browser’s cache, but those copies of jQuery are ignored when they visit your site.
However, when a browser sees references to CDN-hosted copies of jQuery, it understands that all of those references do refer to the exact same file. With all of these CDN references point to exactly the same URLs, the browser can trust that those files truly are identical and won't waste time re-requesting the file if it's already cached. Thus, the browser is able to use a single copy that's cached on-disk, regardless of which site the CDN references appear on.
This creates a potent "cross-site caching" effect which all sites using the CDN benefit from. Since Google's CDN serves the file with headers that attempt tocache the file for up to one year, this effect truly has amazing potential. With many thousands of the most trafficked sites on the Internet already using the Google CDN to serve jQuery, it's quite possible that many of your users will never make a single HTTP request for jQuery when they visit sites using the CDN.
Even if someone visits hundreds of sites using the same Google hosted version of jQuery, they will only need download it once!

Implementation

By now, you’re probably convinced that the Google AJAX Libraries CDN is the way to go for your public facing sites that use jQuery. So, let me show you how you can put it to use.
Of the two methods available, this option is the one that Google recommends:
The google.load() approach offers the most functionality and performance.
For example:

<script type="text/javascript">
  // You may specify partial version numbers, such as "1" or "1.3",
  //  with the same result. Doing so will automatically load the 
  //  latest version matching that partial revision pattern 
  //  (e.g. 1.3 would load 1.3.2 today and 1 would load 1.6.1).
  google.load("jquery", "1.6.1");
 
  google.setOnLoadCallback(function() {
    // Place init code here instead of $(document).ready()
  });
script>
While there’s nothing wrong with this, and it is definitely an improvement over hosting jQuery locally, I don’t agree that it offers the best performance.
Firebug image of the longer loading time caused by jsapi
As you can see, loading, parsing, and executing jsapi delays the actual jQuery request. Not usually by a very large amount, but it’s an unnecessary delay. Tenths of a second may not seem significant, but they add up very quickly.
Worse, you cannot reliably use a $(document).ready() handler in conjunction with this load method. The setOnLoadCallback() handler is a requirement.

Back to basics

In the face of those drawbacks to the google.load() method, I’d suggest using a good ‘ol fashioned <script type="text/javascript"> $(document).ready(function() { // This is more like it! }); script>
Not only does this method avoid the jsapi delay, but it also eliminates three unnecessary HTTP requests. I prefer and recommend this method.
If you're curious why the script reference is missing the leading http:, that's a helpful trick which allows you to use a single reference that works on both HTTP and HTTPS pages. For more information about that and why it matters, be sure to check out this follow-up post: Cripple the Google CDN’s caching with a single character.

Conclusion

The opportunity to let the pros handle part of your site’s JavaScript footprint free of charge is too good to pass up. As often as even returning users experience the “empty cache” load time of your site, it’s important to take advantage of an easy optimization like this one.
What do you think? Are you using the Google AJAX Libraries CDN on your sites? Can you think of a scenario where the google.load() method would perform better than simple